SSL Certificates

The following table shows further information as well as a list of malware samples including the corresponding botnet C&C associated with the SSL certificate fingerprint c7460a72f88611c1fcd7f4d6938cda80c94f9c71.

Database Entry


SHA1 Fingerprint:c7460a72f88611c1fcd7f4d6938cda80c94f9c71
Certificate Common Name (CN):example.com
Issuer Distinguished Name (DN):example.com
TLS Version:TLSv1
First seen:2015-05-06 22:53:40 UTC
Last seen:2015-05-31 09:07:34 UTC
Status:Blacklisted
Listing reason:Dridex C&C
Listing date:2015-05-14 08:43:02
Malware samples:5
Botnet C&Cs:4

Malware Samples


The table below documents all malware samples associated with this SSL certificate.

Timestamp (UTC)Malware Sample (MD5 hash)VTSignatureBotnet C&C (IP:port)
2015-05-31 09:07:34cdf9cd649b7b64f21183cefd000fce14Virustotal results 5/56 (8.93%) Dridex 62.240.61.45:443
2015-05-13 12:15:122ad4dcabfb78497ab92f74aec6fac5c6Virustotal results 2/56 (3.57%) Dridex 87.117.229.29:443
2015-05-11 12:24:21aa8a6e8ebdde7b96f0329497ee95c6d2n/aDridex 151.97.243.220:443
2015-05-10 21:32:37d25a28b8fda1a62c93ac39e94ff0a092n/a87.117.229.29:443
2015-05-06 22:53:40b790c67771304698f9948152da35297bn/aDownloader.Pony59.28.198.171:443

# of entries: 5 (max: 100)